Recent
vulnerability

Key TakeawaysCritical Flaws Exposed: Two zero-day vulnerabilities (CVE-2026-1281 and CVE-2026-1340) in Ivanti Endpoint Manager Mobile (EPMM) allow attackers to hijack devices without authentication.Government Systems Hacked:…

|
Published
stalker

Key TakeawaysMassive Data Exposure: A hacktivist scraped and published the payment records of over half a million customers of consumer-grade stalkerware apps.Vulnerability Exploited: The data…

|
Published

Lorna Mahlock – U.S. Cyber Command Marine Corps Maj. Gen. Lorna Mahlock has been confirmed by the U.S. Senate as deputy commander of U.S. Cyber…

|
Published

Key TakeawaysDatabase Sale: Threat actor "quellostanco" claims to be selling a database of approximately 104,000 records allegedly stolen from EgyptAir on a cybercrime forum.Compromised Data:…

|
Published

Key TakeawaysTargeted Attack: Cyber espionage group UNC3886 targeted Singapore's four major telecom companies: Singtel, StarHub, M1, and Simba Telecom.Limited Exfiltration: The attackers successfully infiltrated some…

|
Published

Crypto crime has moved offline as criminals are targeting people and households, not only wallets or exchanges. As digital risks seep into real lives, AI-assisted…

|
Published
Flickr

Key TakeawaysThird-Party Vulnerability: A security flaw in one of Flickr's third-party email service providers could have led to a data breach, exposing user information.Exposed Information:…

|
Published on February 6, 2026
764 - CSAM - Messages - Chat - Hackers - Emojis

Key TakeawaysArrest and Charges: Aaron Corey, 23, of Albany, New York, was arrested and charged with receiving CSAM, facing up to 20 years in prison.Group…

|
Published on February 6, 2026
Hacker - Phishing - Skull - Data

Key TakeawaysVishing Tactic: A campaign uses deceptive emails about blocked transactions to induce victims to call a fraudulent support number, shifting the attack vector from…

|
Published on February 6, 2026
School - Students - Building

Key TakeawaysSignificant Disruption: A cyberattack has taken La Sapienza University in Rome's computer systems offline for multiple days, affecting its student population.Alleged Attack: The incident…

|
Published on February 6, 2026
Fake News - URL - Protests

Key TakeawaysSurge in Registrations: Security researchers identified a spike of 580 domains between December 2025 and January 2026, exploiting themes of protest, war, and sanctions…

|
Published on February 5, 2026
Man - Table - Glowing Web - Dark Web Market - Sale

Key TakeawaysCriminal Sentencing: Rui-Siang Lin, operator of the Incognito Market, was sentenced to 30 years in prison for narcotics distribution, money laundering, and selling misbranded…

|
Published on February 5, 2026
Hacker - Impersonation - Locks - Profiles - Handcuff

Key TakeawaysGuilty Plea Entered: Kyle Svara, 26, admitted to federal charges, including computer fraud and aggravated identity theft for phishing access codes from nearly 600…

|
Published on February 5, 2026
USB - Cracked Digital Identity - Email - Phishing

Key TakeawaysRapid Escalation: In 2025, the frequency of malicious email attacks more than doubled, reaching a pace of one attack every 19 seconds.Polymorphic Threats: 76%…

|
Published on February 5, 2026
data breach

Key TakeawaysSocial Engineering Vector: Attackers used social engineering tactics to breach Betterment's systems, resulting in the distribution of fraudulent cryptocurrency scam messages to customers.Massive Data…

|
Published on February 5, 2026
NordVPN Passes No-Logs Audit for Sixth Time, Deloitte Confirms

Key TakeawaysNordVPN no-logs audit: Deloitte confirms NordVPN does not collect, store, or track user browsing data.Sixth independent verification: Audit follows global ISAE standards and reviews…

|
Published on February 5, 2026

Key TakeawaysGlobal Scale: Silent Push analysts identified more than 10,000 unique IP addresses infected with SystemBC malware, with the highest concentrations in the U.S., Germany,…

|
Published on February 4, 2026
egypt_social_media

Key TakeawaysNew Legislation: The Spanish government will introduce legislation to ban children under 16 from accessing social media platforms.Mandatory Age Verification: A central component of…

|
Published on February 4, 2026
Office Search - Secret Documents

Key TakeawaysEspionage Allegations: A 60-year-old civilian employee of Poland's Ministry of National Defense has been detained on suspicion of spying for a foreign intelligence agency.Foreign…

|
Published on February 4, 2026

Key TakeawaysRecord Exposure: The ShinyHunters hacking group claims to have compromised more than 2.2 million records from Harvard University and the University of Pennsylvania.Sensitive Data…

|
Published on February 4, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: